SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Reflex VMC: Overview




                                      Mike Wronski, CISSP
                                      VP, Product Management
                                      mike@reflexsystems.com




©2010 Reflex Systems LLC
Virtualization Challenges

               Visibility and Transparency
  Challenges



                  Change Management


                                             Operational
                 Network Management
                                                 &
                                              Security
                   Security / Firewall         Goals



                 Desktop Virtualization
Solution Overview

                                                                Automate, Integrate and Correlate


  Virtual & Cloud            Monitoring & Analysis                                                              Network Security                                         Configuration Mgmt. / Audit
   Infrastructure                  (vWatch)                                                                         (vTrust)                                                     (vProfile)

Virtual Center


                                                              Asset / Inventory
ESX Host




                                                                                             Virtual Firewall




                                                                                                                                                Access Control
                                                                                                                   Segmentation
                                     Performance




                                                                                                                                                                                                      Automation
                    Compliance




                                                                                                                                                                                         Compliance
                                                                                                                                  Virtual DPI
                                                   Capacity




                                                                                                                                                                              Profiles
Guest (VM)

Network

Storage


                                                                                  Virtualization Management Center (VMC)
                                     Discovery/Mapping                                                  Policy Automation                                         vCMDB
                                     Visualization                                                      Scripting                                                 VQL
                                     Central Alerting                                                   Event Correlation                                         Cloud API
                                     Event Correlation                                                  Central Reporting                                         3rd Party interface




                                                                                                                                                                                                                   3
Reflex: vWatch
  Fully integrated component of the Reflex VMC platform
  Monitoring and analysis module which provides a comprehensive overview of the state of the virtual
   environment at any given time
  Through real-time and historical visual reporting, configuration change monitoring, and extensive
   correlation, vWatch provides administrators with the visibility they need
  The ability to visualize both the virtual and underlying hardware infrastructure has become mission critical
   for IT administrators

        Functions:

         Virtual Flow Data


         Historical tracking


        Physical-to-Virtual


           Configuration


         Compliance Audit


        Root-cause Analysis
Visibility and Transparency
Virtual Networking Visibility



 H i s to r i c a l t ra c k i n g


 P hys i c a l - to - V i r t u a l


 C o n f i g u ra t i o n


 Compliance


 Ro o t - c a u s e A n a l ys i s
Reflex: vProfile
    vProfile provides an API that enables service providers and enterprises to provision and
     manage security and compliance without the dependency on expensive external hardware
    vProfile configuration management is the only solution on the market today that provides
     ‘difference visualization’, and plots VM configuration changes according to a graphical, easy
     to understand "heat map" interface

        Functions:
        Apply Baseline Profile
           Configuration

      Heat map and Customized
            Pivot Tables

            Ad-Hoc and
       Scheduled Remediation

      VQL Configuration Queries


     Tiered Configuration Profiles


     Historical Profile Definition


         Batch Modification


          IP Pool Allocation
Reflex: vTrust Segmentation & Security
    Fully integrated component of the Reflex VMC platform
    Designed to be integrated directly with the VMware VMsafe platform technology
    Provides dynamic policy enforcement for virtual environments deployed locally and in external cloud
     environments
    Operating at the hypervisor kernel level, vTrust leverages the tightly integrated VMsafe component of
     VMware vSphere™ 4
    Facilitates adaptive, extensible policies that allow administrators to address complex business,
     information security and compliance requirements within the virtual environment

       Functions:

      Virtual Segmentation


       Virtual Quarantine


       Networking Policy


       Stateful Inspection


            Agentless




                                                                                                             8
VMware VMsafe Integration

• Low-Level Enforcement                             Policy

• Part of the Hypervisor                     VM
                                             ACLs
• VM Network Segmentation/Firewall
                                                        VMsafe
• Multi-Virtual Center Aware
• vMotion Aware
• Policy Mobility

                               vmSafe Kernel Module

                                     (d)vSwitch
                                ESX Hypervisor
Software Asset Management

 •No Agents to Install
 •Independent of State
    •Power
    •Templates
 •Policy Criteria
    •NAC
    •Posture Checking
    •Maintain Compliance
Automation: Policy and Enforcement

Policy Types                             Enforcement Points
           •Segmentation (Firewall)       Network
           •Quarantine (NAC, Posture)
 Network   •Redirection (IDP, Capture)    • Reflex VMsafe
           •Configuration (VLAN, QoS)
                                          • 3rd Party (TippingPoint)
                                          • VI API
           •Storage
           •Network Connection
  Guest    •Software (OS, App, Patch)     Infrastructure
           •Authorization
                                          • VI API
           •Access Control
                                          • 3rd Party API/DB/CLI
           •Authorization
 vCenter   •Resource Pools
                                          Generic
           •Storage

                                          • Generic Programmable (Python)
 Device    •Chassis (UCS, Blade Ctr)        • Element Managers
           •Switch
           •Security Device
                                            • Orchestration / Provisioning
 Config                                     • Notification



                                                                             11
Continuous Compliance

Software Asset (OS, App Version, Patch)

   Storage Mapping (Data Classification)

       Security Controls Enabled (Firewall, IPS)

           Provisioning User Authorization

             Compliant VM Authorized
Thank You!
Mike Wronski, VP Product Management
Email: mike@reflexsystems.com
Web: http://www.reflexsystems.com

Más contenido relacionado

La actualidad más candente

Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
 
System Center
System CenterSystem Center
System CenterBlauge
 
Devopsdays Enstratus Overview
Devopsdays Enstratus OverviewDevopsdays Enstratus Overview
Devopsdays Enstratus OverviewJohn Willis
 
VMUG ISRAEL November 2012, EMC session by Itzik Reich
VMUG ISRAEL November 2012, EMC session by Itzik ReichVMUG ISRAEL November 2012, EMC session by Itzik Reich
VMUG ISRAEL November 2012, EMC session by Itzik ReichItzik Reich
 
Covmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's newCovmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's newesarakaitis
 
A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...ijsrd.com
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
CA Nimsoft Monitor for Vblock
CA Nimsoft Monitor for VblockCA Nimsoft Monitor for Vblock
CA Nimsoft Monitor for VblockCA Nimsoft
 
Scvmm 2012 Building of Private Clouds and Federation to the Public Cloud
Scvmm 2012 Building of Private Clouds and Federation to the Public CloudScvmm 2012 Building of Private Clouds and Federation to the Public Cloud
Scvmm 2012 Building of Private Clouds and Federation to the Public CloudLai Yoong Seng
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...FindWhitePapers
 
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStackCitrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStackRightScale
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
SIM204-What's Coming in Virtual Machine Manager 2012?
SIM204-What's Coming in Virtual Machine Manager 2012?SIM204-What's Coming in Virtual Machine Manager 2012?
SIM204-What's Coming in Virtual Machine Manager 2012?Lai Yoong Seng
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedThe Linux Foundation
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecCloudPassage
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper Networks
 
Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11영호 라
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Enterprise
 

La actualidad más candente (20)

Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
System Center
System CenterSystem Center
System Center
 
Devopsdays Enstratus Overview
Devopsdays Enstratus OverviewDevopsdays Enstratus Overview
Devopsdays Enstratus Overview
 
VMUG ISRAEL November 2012, EMC session by Itzik Reich
VMUG ISRAEL November 2012, EMC session by Itzik ReichVMUG ISRAEL November 2012, EMC session by Itzik Reich
VMUG ISRAEL November 2012, EMC session by Itzik Reich
 
Covmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's newCovmug v sphere 4.1 what's new
Covmug v sphere 4.1 what's new
 
A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
CA Nimsoft Monitor for Vblock
CA Nimsoft Monitor for VblockCA Nimsoft Monitor for Vblock
CA Nimsoft Monitor for Vblock
 
Scvmm 2012 Building of Private Clouds and Federation to the Public Cloud
Scvmm 2012 Building of Private Clouds and Federation to the Public CloudScvmm 2012 Building of Private Clouds and Federation to the Public Cloud
Scvmm 2012 Building of Private Clouds and Federation to the Public Cloud
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStackCitrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
SIM204-What's Coming in Virtual Machine Manager 2012?
SIM204-What's Coming in Virtual Machine Manager 2012?SIM204-What's Coming in Virtual Machine Manager 2012?
SIM204-What's Coming in Virtual Machine Manager 2012?
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embedded
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next LevelJuniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
 
Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11Tacademy techclinic-2012-07-11
Tacademy techclinic-2012-07-11
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 

Similar a Federal VMUG - March - Reflex VMC Overview

Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudManaging Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudRightScale
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex Corporation
 
Ismael Intalio Cloud Benefits
Ismael Intalio Cloud BenefitsIsmael Intalio Cloud Benefits
Ismael Intalio Cloud BenefitsTomoaki Sawada
 
The role of hyper-v in nist model
The role of hyper-v in nist modelThe role of hyper-v in nist model
The role of hyper-v in nist modelAlexey Bokov
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 OverviewAmit Gatenyo
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch officeInterop
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingCloudPassage
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceOW2
 

Similar a Federal VMUG - March - Reflex VMC Overview (20)

Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public CloudManaging Cloud Security: Intrusion Detection Services in a Public Cloud
Managing Cloud Security: Intrusion Detection Services in a Public Cloud
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework
 
Ismael Intalio Cloud Benefits
Ismael Intalio Cloud BenefitsIsmael Intalio Cloud Benefits
Ismael Intalio Cloud Benefits
 
Intalio Cloud Benefits
Intalio Cloud Benefits Intalio Cloud Benefits
Intalio Cloud Benefits
 
The role of hyper-v in nist model
The role of hyper-v in nist modelThe role of hyper-v in nist model
The role of hyper-v in nist model
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 Overview
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch office
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud InfrastructurePrivate Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScience
 

Más de langonej

Federal VMUG - March - Main Deck & MicroTech VDI
Federal VMUG - March - Main Deck & MicroTech VDIFederal VMUG - March - Main Deck & MicroTech VDI
Federal VMUG - March - Main Deck & MicroTech VDIlangonej
 
Federal VMUG - March - Transforming desktops with View
Federal VMUG - March - Transforming desktops with ViewFederal VMUG - March - Transforming desktops with View
Federal VMUG - March - Transforming desktops with Viewlangonej
 
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...langonej
 
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...langonej
 
CES Government 2010: Cloud Computing in the Public Sector
CES Government 2010: Cloud Computing in the Public SectorCES Government 2010: Cloud Computing in the Public Sector
CES Government 2010: Cloud Computing in the Public Sectorlangonej
 
DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009langonej
 

Más de langonej (6)

Federal VMUG - March - Main Deck & MicroTech VDI
Federal VMUG - March - Main Deck & MicroTech VDIFederal VMUG - March - Main Deck & MicroTech VDI
Federal VMUG - March - Main Deck & MicroTech VDI
 
Federal VMUG - March - Transforming desktops with View
Federal VMUG - March - Transforming desktops with ViewFederal VMUG - March - Transforming desktops with View
Federal VMUG - March - Transforming desktops with View
 
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...
Federal VMUG - March - Virtual machine sizing considerations in a numa enviro...
 
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
 
CES Government 2010: Cloud Computing in the Public Sector
CES Government 2010: Cloud Computing in the Public SectorCES Government 2010: Cloud Computing in the Public Sector
CES Government 2010: Cloud Computing in the Public Sector
 
DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009DC Metro And Federal VMUG March 2009
DC Metro And Federal VMUG March 2009
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Federal VMUG - March - Reflex VMC Overview

  • 1. Reflex VMC: Overview Mike Wronski, CISSP VP, Product Management mike@reflexsystems.com ©2010 Reflex Systems LLC
  • 2. Virtualization Challenges Visibility and Transparency Challenges Change Management Operational Network Management & Security Security / Firewall Goals Desktop Virtualization
  • 3. Solution Overview Automate, Integrate and Correlate Virtual & Cloud Monitoring & Analysis Network Security Configuration Mgmt. / Audit Infrastructure (vWatch) (vTrust) (vProfile) Virtual Center Asset / Inventory ESX Host Virtual Firewall Access Control Segmentation Performance Automation Compliance Compliance Virtual DPI Capacity Profiles Guest (VM) Network Storage Virtualization Management Center (VMC)  Discovery/Mapping  Policy Automation  vCMDB  Visualization  Scripting  VQL  Central Alerting  Event Correlation  Cloud API  Event Correlation  Central Reporting  3rd Party interface 3
  • 4. Reflex: vWatch  Fully integrated component of the Reflex VMC platform  Monitoring and analysis module which provides a comprehensive overview of the state of the virtual environment at any given time  Through real-time and historical visual reporting, configuration change monitoring, and extensive correlation, vWatch provides administrators with the visibility they need  The ability to visualize both the virtual and underlying hardware infrastructure has become mission critical for IT administrators Functions: Virtual Flow Data Historical tracking Physical-to-Virtual Configuration Compliance Audit Root-cause Analysis
  • 6. Virtual Networking Visibility H i s to r i c a l t ra c k i n g P hys i c a l - to - V i r t u a l C o n f i g u ra t i o n Compliance Ro o t - c a u s e A n a l ys i s
  • 7. Reflex: vProfile  vProfile provides an API that enables service providers and enterprises to provision and manage security and compliance without the dependency on expensive external hardware  vProfile configuration management is the only solution on the market today that provides ‘difference visualization’, and plots VM configuration changes according to a graphical, easy to understand "heat map" interface Functions: Apply Baseline Profile Configuration Heat map and Customized Pivot Tables Ad-Hoc and Scheduled Remediation VQL Configuration Queries Tiered Configuration Profiles Historical Profile Definition Batch Modification IP Pool Allocation
  • 8. Reflex: vTrust Segmentation & Security  Fully integrated component of the Reflex VMC platform  Designed to be integrated directly with the VMware VMsafe platform technology  Provides dynamic policy enforcement for virtual environments deployed locally and in external cloud environments  Operating at the hypervisor kernel level, vTrust leverages the tightly integrated VMsafe component of VMware vSphere™ 4  Facilitates adaptive, extensible policies that allow administrators to address complex business, information security and compliance requirements within the virtual environment Functions: Virtual Segmentation Virtual Quarantine Networking Policy Stateful Inspection Agentless 8
  • 9. VMware VMsafe Integration • Low-Level Enforcement Policy • Part of the Hypervisor VM ACLs • VM Network Segmentation/Firewall VMsafe • Multi-Virtual Center Aware • vMotion Aware • Policy Mobility vmSafe Kernel Module (d)vSwitch ESX Hypervisor
  • 10. Software Asset Management •No Agents to Install •Independent of State •Power •Templates •Policy Criteria •NAC •Posture Checking •Maintain Compliance
  • 11. Automation: Policy and Enforcement Policy Types Enforcement Points •Segmentation (Firewall) Network •Quarantine (NAC, Posture) Network •Redirection (IDP, Capture) • Reflex VMsafe •Configuration (VLAN, QoS) • 3rd Party (TippingPoint) • VI API •Storage •Network Connection Guest •Software (OS, App, Patch) Infrastructure •Authorization • VI API •Access Control • 3rd Party API/DB/CLI •Authorization vCenter •Resource Pools Generic •Storage • Generic Programmable (Python) Device •Chassis (UCS, Blade Ctr) • Element Managers •Switch •Security Device • Orchestration / Provisioning Config • Notification 11
  • 12. Continuous Compliance Software Asset (OS, App Version, Patch) Storage Mapping (Data Classification) Security Controls Enabled (Firewall, IPS) Provisioning User Authorization Compliant VM Authorized
  • 13. Thank You! Mike Wronski, VP Product Management Email: mike@reflexsystems.com Web: http://www.reflexsystems.com